SlideShare une entreprise Scribd logo
1  sur  26
Designing a Security
Intelligence Architecture

Daniel Wiley
Senior Security Consultant

©2013 Check Point Software Technologies Ltd.
You have been told that you have
an infected machine in your network…

You have seconds to make
a difference Now what?
©2013 Check Point Software Technologies Ltd.

2
Threats are always changing

Attackers are using any method available to
infiltrate networks
Attacks are moving up the network stack means
more information is needed to deal with them
Scaling tools and architecture is not simple as
you move up to threat landscape
If you have something worth stealing someone will try

©2013 Check Point Software Technologies Ltd.

3
Need architecture that adapts
• Can’t limit yourself to one function anymore

• Need versatility ability to find the right tool quickly
• Ability to layer capabilities on existing architectures

©2013 Check Point Software Technologies Ltd.

4
What does that really all mean
You need features that can adapt to
changing environments
Ability to react to attacks needs to be in real time
Need to think outside of the box sometimes
The more data the better
Sometimes you have to make the hard decisions

©2013 Check Point Software Technologies Ltd.

5
What does it take?
1

Know your environment

2

You need context

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

6
This doesn’t help
Internet

Internal

©2013 Check Point Software Technologies Ltd.

7
Sounds simple but isn’t
Understand the whole Network Topology
Application Architecture is vital to defense
Network Design is vital to get the visibility you need
What do users normally do?
Can you answer the basic questions about core data flows
and business drivers?

Who are your partners

©2013 Check Point Software Technologies Ltd.

8
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

9
What does this all mean!

Context

• Having an IP address alone does not help
• What does the log really mean to my environment
• It’s hard to see who is actually attacking you
• Layering context is great but what do you with the data

©2013 Check Point Software Technologies Ltd.

10
How do you build context

Automated

Manual

• Geo Location

• Past Experiences

• Identity Awareness

• Application Flows

• Application Intelligence

• Business Goals and Direction

• DLP

• Relationships

• URL Filtering/Logging

• Third party information

• Hit count

• Network Architecture

• Smart Monitor/Smart Log

• Compliance Requirements

• Header Identification

• Change Control

• Machine Identification

• Lessons Learned

©2013 Check Point Software Technologies Ltd.

11
Some examples
What we used to see in a log:
Source: 1.1.1.1 Destination: 2.2.2.2 Service: TCP/80
Action: Allow
What we see now:
Source: 1.1.1.1 Destination 2.2.2.2 Service: TCP/80
User: Bob Barker Machine: PriceIsRight OS: WinXP
Browser: Chrome Server: Apache
URL: www.hackme.org/malware.exe URL Category: Hacking Site
IPS: Binary Download Country: US
Anti-Bot: reallybadstuff.v52
Packet Capture: onaplatter.exe
Action: Block
©2013 Check Point Software Technologies Ltd.

12
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

13
I can’t see anything
Engineer with logging in mind – The more you log
the more you can see
Ensure you are capturing all key metrics
(SmartMonitor/SNMP) at gateway and network
Learn TCPDUMP/WireShark/fw monitor

Utilize Packet Capture mode within IPS and Anti-Bot
Understand what you are capturing and why
Everything creates a log – Learn them

©2013 Check Point Software Technologies Ltd.

14
Advanced Visibility
When you identify the really nasty stuff you
need to know how to deal with it.

• Threat Emulation
• Malware Reversing
• Locating infected hosts
• Having control over network means blocking hostile code

©2013 Check Point Software Technologies Ltd.

15
What does it take?
1

Know your environment

2

You need context to the data

3

Build visibility into your network

4

Don’t forget Layer 7 and 8

©2013 Check Point Software Technologies Ltd.

16
Layer 7
Without application layer data finding
golden nugget is almost impossible

Email

Data
Exfil

Web

Anti-Bot/DLP
Application Control/URL Filtering
IPS
IP Addresses / Services / Time / Direction
©2013 Check Point Software Technologies Ltd.

17
Layer 7
Once you know the attack vectors you can trace the risk
to your network and maybe the actual attacker

Fraud
Event

Corp
Espionage

Hacking
Event

CEO
©2013 Check Point Software Technologies Ltd.

18
Layer 8 – Man humans are difficult
Without management on board having all the information
in the world won’t help
Incident Response is vital – Plan, Test, Evaluate, Repeat
Do you have a plan for interacting with law enforcement
Who is really attacking you and why
Know your gaps and try and address them

©2013 Check Point Software Technologies Ltd.

19
Core Items Need
As many blades as possible with advanced features
(Packet Capture/URL Logging/SMTP Information)
Large logging infrastructure
A Network Map

A Org Chart
SmartEvent
SmartLog
Enough resources to generate higher level data

©2013 Check Point Software Technologies Ltd.

20
Putting it all together
For any intelligence system try to answer
the following questions:
Who: Financial officer was targeted
What: Installation of malware on PC, attempted to upload Excel
spreadsheet to C&C
Where: PC location within executive zone, C&C located in Brazil
When: Over 5 month period multiple spear fishing emails
Why: After full analysis determined that excel spreadsheet would give
completive advantage to competition
Infrastructure – DLP, Anti-Bot, Anti-Virus, Endpoint, Logging, SmartEvent
©2013 Check Point Software Technologies Ltd.

21
What’s the point of all of this
Time for analysis and full understand of an event
is greatly decreased
Ability to identify who is targeted and what the risk really is
You need to make blocking decisions quickly

Talking about it over 5 days isn’t going to help
If you can react to malware events in minutes or seconds
you are doing as good as the best

©2013 Check Point Software Technologies Ltd.

22
How can you use Check Point - Gateway

• Firewall
- Advanced Logging Options such as URL logging
Log all rules

• Utilize Application Control and URL Filtering
• Identity Awareness
• Anti-Bot/Anti-Virus
- Utilize Packet Capture Ability

• IPS
- Utilize Packet Capture Ability
- Ensure advanced features are enabled on the IPS Blade
- GeoLocation

©2013 Check Point Software Technologies Ltd.

23
How can you use Check Point Management
• SmartLog
- Create predefined searches for specific events – Such as
Logon / Logoff events for Identity logs

• SmartEvent

• Endpoint
- Compliance Checks
- MD5/OS Checks
- AV Events
- Firewall Logs

©2013 Check Point Software Technologies Ltd.

24
Summary

Visibility

Advanced
Blades

Log everything
Network Map
Full Team
Envolvement

Context

Known your
environment
Understand
network
Overlay
business
requirements

Control

Create areas of
control
Management
Onboard
Builds
Intelligence

©2013 Check Point Software Technologies Ltd.

25
Thank You!

Daniel Wiley
Senior Security Consultant

©2013 Check Point Software Technologies Ltd.

Contenu connexe

Tendances

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 

Tendances (20)

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security productsAyulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Vpn
VpnVpn
Vpn
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security Baselines
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 

En vedette

Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
Chema Alonso
 

En vedette (15)

Checkpoint r77
Checkpoint r77Checkpoint r77
Checkpoint r77
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70
 
Checkpoint 1 (1)
Checkpoint 1 (1)Checkpoint 1 (1)
Checkpoint 1 (1)
 
Political checkpoint
Political checkpointPolitical checkpoint
Political checkpoint
 
Cp r75 firewall_admin_guide
Cp r75 firewall_admin_guideCp r75 firewall_admin_guide
Cp r75 firewall_admin_guide
 
Postgre sql +python
Postgre sql +pythonPostgre sql +python
Postgre sql +python
 
Check Point. Актуальные задачи сетевой безопасности.
Check Point. Актуальные задачи сетевой безопасности.Check Point. Актуальные задачи сетевой безопасности.
Check Point. Актуальные задачи сетевой безопасности.
 
Fundamentos de Banco de Dados Relacionais
Fundamentos de Banco de Dados RelacionaisFundamentos de Banco de Dados Relacionais
Fundamentos de Banco de Dados Relacionais
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Cambridge Checkpoint
Cambridge CheckpointCambridge Checkpoint
Cambridge Checkpoint
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
 

Similaire à Check Point designing a security

Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
danhaley45372
 

Similaire à Check Point designing a security (20)

Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Endpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint SecurityEndpoint Modeling 101 - A New Approach to Endpoint Security
Endpoint Modeling 101 - A New Approach to Endpoint Security
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 
Pragmatic intelsans intelsummit2014
Pragmatic intelsans intelsummit2014Pragmatic intelsans intelsummit2014
Pragmatic intelsans intelsummit2014
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Part 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docxPart 1You have been recently hired as a network security analyst.docx
Part 1You have been recently hired as a network security analyst.docx
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 

Plus de Group of company MUK

Plus de Group of company MUK (14)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Check Point designing a security

  • 1. Designing a Security Intelligence Architecture Daniel Wiley Senior Security Consultant ©2013 Check Point Software Technologies Ltd.
  • 2. You have been told that you have an infected machine in your network… You have seconds to make a difference Now what? ©2013 Check Point Software Technologies Ltd. 2
  • 3. Threats are always changing Attackers are using any method available to infiltrate networks Attacks are moving up the network stack means more information is needed to deal with them Scaling tools and architecture is not simple as you move up to threat landscape If you have something worth stealing someone will try ©2013 Check Point Software Technologies Ltd. 3
  • 4. Need architecture that adapts • Can’t limit yourself to one function anymore • Need versatility ability to find the right tool quickly • Ability to layer capabilities on existing architectures ©2013 Check Point Software Technologies Ltd. 4
  • 5. What does that really all mean You need features that can adapt to changing environments Ability to react to attacks needs to be in real time Need to think outside of the box sometimes The more data the better Sometimes you have to make the hard decisions ©2013 Check Point Software Technologies Ltd. 5
  • 6. What does it take? 1 Know your environment 2 You need context 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 6
  • 7. This doesn’t help Internet Internal ©2013 Check Point Software Technologies Ltd. 7
  • 8. Sounds simple but isn’t Understand the whole Network Topology Application Architecture is vital to defense Network Design is vital to get the visibility you need What do users normally do? Can you answer the basic questions about core data flows and business drivers? Who are your partners ©2013 Check Point Software Technologies Ltd. 8
  • 9. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 9
  • 10. What does this all mean! Context • Having an IP address alone does not help • What does the log really mean to my environment • It’s hard to see who is actually attacking you • Layering context is great but what do you with the data ©2013 Check Point Software Technologies Ltd. 10
  • 11. How do you build context Automated Manual • Geo Location • Past Experiences • Identity Awareness • Application Flows • Application Intelligence • Business Goals and Direction • DLP • Relationships • URL Filtering/Logging • Third party information • Hit count • Network Architecture • Smart Monitor/Smart Log • Compliance Requirements • Header Identification • Change Control • Machine Identification • Lessons Learned ©2013 Check Point Software Technologies Ltd. 11
  • 12. Some examples What we used to see in a log: Source: 1.1.1.1 Destination: 2.2.2.2 Service: TCP/80 Action: Allow What we see now: Source: 1.1.1.1 Destination 2.2.2.2 Service: TCP/80 User: Bob Barker Machine: PriceIsRight OS: WinXP Browser: Chrome Server: Apache URL: www.hackme.org/malware.exe URL Category: Hacking Site IPS: Binary Download Country: US Anti-Bot: reallybadstuff.v52 Packet Capture: onaplatter.exe Action: Block ©2013 Check Point Software Technologies Ltd. 12
  • 13. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 13
  • 14. I can’t see anything Engineer with logging in mind – The more you log the more you can see Ensure you are capturing all key metrics (SmartMonitor/SNMP) at gateway and network Learn TCPDUMP/WireShark/fw monitor Utilize Packet Capture mode within IPS and Anti-Bot Understand what you are capturing and why Everything creates a log – Learn them ©2013 Check Point Software Technologies Ltd. 14
  • 15. Advanced Visibility When you identify the really nasty stuff you need to know how to deal with it. • Threat Emulation • Malware Reversing • Locating infected hosts • Having control over network means blocking hostile code ©2013 Check Point Software Technologies Ltd. 15
  • 16. What does it take? 1 Know your environment 2 You need context to the data 3 Build visibility into your network 4 Don’t forget Layer 7 and 8 ©2013 Check Point Software Technologies Ltd. 16
  • 17. Layer 7 Without application layer data finding golden nugget is almost impossible Email Data Exfil Web Anti-Bot/DLP Application Control/URL Filtering IPS IP Addresses / Services / Time / Direction ©2013 Check Point Software Technologies Ltd. 17
  • 18. Layer 7 Once you know the attack vectors you can trace the risk to your network and maybe the actual attacker Fraud Event Corp Espionage Hacking Event CEO ©2013 Check Point Software Technologies Ltd. 18
  • 19. Layer 8 – Man humans are difficult Without management on board having all the information in the world won’t help Incident Response is vital – Plan, Test, Evaluate, Repeat Do you have a plan for interacting with law enforcement Who is really attacking you and why Know your gaps and try and address them ©2013 Check Point Software Technologies Ltd. 19
  • 20. Core Items Need As many blades as possible with advanced features (Packet Capture/URL Logging/SMTP Information) Large logging infrastructure A Network Map A Org Chart SmartEvent SmartLog Enough resources to generate higher level data ©2013 Check Point Software Technologies Ltd. 20
  • 21. Putting it all together For any intelligence system try to answer the following questions: Who: Financial officer was targeted What: Installation of malware on PC, attempted to upload Excel spreadsheet to C&C Where: PC location within executive zone, C&C located in Brazil When: Over 5 month period multiple spear fishing emails Why: After full analysis determined that excel spreadsheet would give completive advantage to competition Infrastructure – DLP, Anti-Bot, Anti-Virus, Endpoint, Logging, SmartEvent ©2013 Check Point Software Technologies Ltd. 21
  • 22. What’s the point of all of this Time for analysis and full understand of an event is greatly decreased Ability to identify who is targeted and what the risk really is You need to make blocking decisions quickly Talking about it over 5 days isn’t going to help If you can react to malware events in minutes or seconds you are doing as good as the best ©2013 Check Point Software Technologies Ltd. 22
  • 23. How can you use Check Point - Gateway • Firewall - Advanced Logging Options such as URL logging Log all rules • Utilize Application Control and URL Filtering • Identity Awareness • Anti-Bot/Anti-Virus - Utilize Packet Capture Ability • IPS - Utilize Packet Capture Ability - Ensure advanced features are enabled on the IPS Blade - GeoLocation ©2013 Check Point Software Technologies Ltd. 23
  • 24. How can you use Check Point Management • SmartLog - Create predefined searches for specific events – Such as Logon / Logoff events for Identity logs • SmartEvent • Endpoint - Compliance Checks - MD5/OS Checks - AV Events - Firewall Logs ©2013 Check Point Software Technologies Ltd. 24
  • 25. Summary Visibility Advanced Blades Log everything Network Map Full Team Envolvement Context Known your environment Understand network Overlay business requirements Control Create areas of control Management Onboard Builds Intelligence ©2013 Check Point Software Technologies Ltd. 25
  • 26. Thank You! Daniel Wiley Senior Security Consultant ©2013 Check Point Software Technologies Ltd.